Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4461

Опубликовано: 30 дек. 2011
Источник: debian

Описание

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jettyfixed6.1.26-1package
jettyno-dsasqueezepackage

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 14 лет назад

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

redhat
около 14 лет назад

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

CVSS3: 5.3
nvd
около 14 лет назад

Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

CVSS3: 5.3
github
больше 3 лет назад

Improper Input Validation in Jetty